My name is Rakesh and saying I am a huge nerd would probably be an understatement.. I love technology and getting my hands into the CLI or trying something new. I started this page because I've had a lot of people ask for help with some of the things I've either deployment in my professional career or at clients.
Tuesday, 8 July 2025
Tuesday, 1 July 2025
IKEv1 vs IKEv2
IKEv1 is not used at all. IKEv2 provides several enhancements compared to IKEv1, including:
EAP authentication. IKEv2 can use an authentication, authorization, and accounting (AAA) server to remotely authenticate mobile and PC users and assign private addresses to these users. IKEv1 does not provide this function and must use Layer 2 Tunneling Protocol (L2TP) to assign private addresses.
IKEv2 simplifies the SA negotiation process. IKEv2 uses two exchanges (a total of four messages) to create an IKE SA and a pair of IPsec SAs, as compared to the six messages exchanged in IKE v1. To create multiple pairs of IPsec SAs, only one additional exchange is needed for each additional pair of SAs.
Support for asymmetric authentication.
Built-in NAT traversal.
Support for FlexVPN.
Why do many Palo Alto engineers open a TAC case immediately… without checking anything first?
A production issue happens. Application team says “network issue.” Users say “firewall problem.” And within minutes someone says: “Let’s ope...
-
The TCP connection setup behavior for a Standard virtual server operates as follows: the three-way TCP handshake occurs on the client si...
-
1. Restoring the BIG-IP configuration to the factory default setting Impact of procedure: This procedure removes all BIG-IP local traffic o...
-
Problem this snippet solves: Next article describes an upgrade procedure to perform only using CLI commands. The idea is not to rep...
